Beyond Universal Person Re-Identification Attack

被引:15
作者
Ding, Wenjie [1 ]
Wei, Xing [2 ]
Ji, Rongrong [3 ]
Hong, Xiaopeng [4 ]
Tian, Qi [5 ]
Gong, Yihong [2 ]
机构
[1] Xi An Jiao Tong Univ, Coll Artificial Intelligence, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Coll Software Engn, Xian 710049, Peoples R China
[3] Xiamen Univ, Sch Informat, Dept Artificial Intelligence, Xiamen 361005, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710049, Peoples R China
[5] Huawei Technol, Cloud & AI, Shenzhen 518129, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Perturbation methods; Task analysis; Computational modeling; Electronic mail; Neural networks; Linear programming; Training; Universal adversarial perturbation; cross-model attack; list-wise attack; person Re-ID; TRACKING;
D O I
10.1109/TIFS.2021.3081247
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deep learning-based person re-identification (Re-ID) has made great progress and achieved high performance recently. In this paper, we make the first attempt to examine the vulnerability of current person Re-ID models against a dangerous attack method, i.e., the universal adversarial perturbation (UAP) attack, which has been shown to fool classification models with a little overhead. We propose a more universal adversarial perturbation (MUAP) method for both image-agnostic and model-insensitive person Re-ID attack. Firstly, we adopt a list-wise attack objective function to disrupt the similarity ranking list directly. Secondly, we propose a model-insensitive mechanism for cross-model attack. Extensive experiments show that the proposed attack approach achieves high attack performance and outperforms other state of the arts by large margin in cross-model scenario. The results also demonstrate the vulnerability of current Re-ID models to MUAP and further suggest the need of designing more robust Re-ID models.
引用
收藏
页码:3442 / 3455
页数:14
相关论文
共 75 条
  • [1] Aishan Liu, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12358), P395, DOI 10.1007/978-3-030-58601-0_24
  • [2] Andriushchenko Maksym, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12368), P484, DOI 10.1007/978-3-030-58592-1_29
  • [3] Bai S., 2019, ARXIV190110650
  • [4] Brendel Wieland, 2018, P 6 INT C LEARN REPR
  • [5] Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks
    Brunner, Thomas
    Diehl, Frederik
    Le, Michael Truong
    Knoll, Alois
    [J]. 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 4957 - 4965
  • [6] Transductive semi-supervised metric learning for person re-identification
    Chang, Xinyuan
    Ma, Zhiheng
    Wei, Xing
    Hong, Xiaopeng
    Gong, Yihong
    [J]. PATTERN RECOGNITION, 2020, 108
  • [7] HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
    Chen, Jianbo
    Jordan, Michael, I
    Wainwright, Martin J.
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1277 - 1294
  • [8] Person Re-Identification by Multi-Channel Parts-Based CNN with Improved Triplet Loss Function
    Cheng, De
    Gong, Yihong
    Zhou, Sanping
    Wang, Jinjun
    Zheng, Nanning
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 1335 - 1344
  • [9] Ding WJ, 2020, IEEE IMAGE PROC, P2441, DOI 10.1109/ICIP40778.2020.9191166
  • [10] Dong X., 2020, P IEEE CVF C COMP VI, P12895